November 2024

DeepData Malware Exploits Fortinet VPN Zero-Day in Sophisticated Espionage Campaign

DeepData Malware Exploits Fortinet VPN Zero-Day in Sophisticated Espionage Campaign 2024-11-22 at 12:06 View original post at Safety Detectives In a recent cybersecurity development, the DeepData malware framework has been observed exploiting a zero-day vulnerability in Fortinet’s FortiClient VPN for Windows to extract user credentials. This sophisticated surveillance tool employs multiple plugins to target sensitive […]

React to this headline:

Loading spinner

DeepData Malware Exploits Fortinet VPN Zero-Day in Sophisticated Espionage Campaign Read More »

Chinese Cyber-Espionage Targets T-Mobile in Widespread US Telecom Breach

Chinese Cyber-Espionage Targets T-Mobile in Widespread US Telecom Breach 2024-11-22 at 12:06 View original post at Safety Detectives In recent months, a significant cyber-espionage campaign linked to Chinese state-sponsored actors has targeted major telecommunications companies in the United States, including T-Mobile. The operation, identified as “Salt Typhoon,” aimed to infiltrate networks to monitor communications of

React to this headline:

Loading spinner

Chinese Cyber-Espionage Targets T-Mobile in Widespread US Telecom Breach Read More »

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks 2024-11-22 at 11:50 By Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams, fraud, and phishing attacks. To that end, Microsoft’s Digital Crimes Unit (DCU) said it seized 240 fraudulent websites

React to this headline:

Loading spinner

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks Read More »

Security for AI Copilots in SaaS apps identifies risky access permissions

Security for AI Copilots in SaaS apps identifies risky access permissions 2024-11-22 at 11:16 By Industry News Securiti announced a new solution – Security for AI Copilots in SaaS apps. The biggest impediment in adopting AI Copilots, like Microsoft 365 Copilot, is the security of data. Organizations must ensure that data does not inadvertently leak

React to this headline:

Loading spinner

Security for AI Copilots in SaaS apps identifies risky access permissions Read More »

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications 2024-11-22 at 11:06 By Industry News SentinelOne announced new AI security posture management (AI-SPM) capabilities to protect and secure the use of AI services in the workplace. Built on SentinelOne’s Singularity cybersecurity platform, the new offering will expand SentinelOne’s top-rated Singularity Cloud Security portfolio to give

React to this headline:

Loading spinner

SentinelOne AI-SPM detects misconfigurations and vulnerabilities in AI applications Read More »

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking 2024-11-22 at 10:39 By Connor Jones Fledgling band of crooks says it stole 1.2 TB of data The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion

React to this headline:

Loading spinner

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking Read More »

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more! 2024-11-22 at 10:01 By Help Net Security The Proxmox Virtual Environment 8.3 enterprise virtualization solution features management tools and a user-friendly web interface, allowing you to deploy open-source solutions in clustered, highly available setups. This version is based on Debian 12.8 (Bookworm), but uses

React to this headline:

Loading spinner

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more! Read More »

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries 2024-11-22 at 09:04 By Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer. The packages, named gptplus and claudeai-eng,

React to this headline:

Loading spinner

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries Read More »

Whomp-whomp: AI PCs make users less productive

Whomp-whomp: AI PCs make users less productive 2024-11-22 at 08:38 By Thomas Claburn People just don’t know how to talk to chatbots to get them to do useful things efficiently, Intel says Those using personal computers with built-in AI services currently are less productive than those using traditional PCs, according to a study conducted by

React to this headline:

Loading spinner

Whomp-whomp: AI PCs make users less productive Read More »

The limits of AI-based deepfake detection

The limits of AI-based deepfake detection 2024-11-22 at 08:03 By Mirko Zorz In this Help Net Security interview, Ben Colman, CEO of Reality Defender, discusses the challenges of detecting high-quality deepfakes in real-world applications. He addresses the effectiveness and limitations of watermarking, AI-based detection, and the potential of emerging technologies in securing media authenticity. Colman

React to this headline:

Loading spinner

The limits of AI-based deepfake detection Read More »

Why the NIS2 Directive causes growing pains for businesses

Why the NIS2 Directive causes growing pains for businesses 2024-11-22 at 07:48 By Help Net Security In this Help Net Security video, Dror Liwer, co-founder of Coro, discusses how the EU’s NIS2, its latest security directive for businesses, officially became enforceable recently. This means EU companies face more demanding requirements for internal cyber resilience strategies

React to this headline:

Loading spinner

Why the NIS2 Directive causes growing pains for businesses Read More »

Helpline for Yakuza victims fears it leaked their personal info

Helpline for Yakuza victims fears it leaked their personal info 2024-11-22 at 07:30 By Laura Dobberstein Organized crime types tend not to be kind to those who go against them, so this is nasty A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led

React to this headline:

Loading spinner

Helpline for Yakuza victims fears it leaked their personal info Read More »

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

AWS gives its management screens a makeover in the name of improved productivity

AWS gives its management screens a makeover in the name of improved productivity 2024-11-22 at 06:35 By Simon Sharwood Maybe it was crowded layout, inconsistent colors and drop shadows that made cloud so hard? Amazon Web Services pioneered public cloud computing, and by doing so created myriad possibilities that have shaped the world we live

React to this headline:

Loading spinner

AWS gives its management screens a makeover in the name of improved productivity Read More »

Deepfake attacks occur every five minutes

Deepfake attacks occur every five minutes 2024-11-22 at 06:35 By Help Net Security As cybercriminals continue to adapt their techniques to find new ways through defenses, AI-assisted fraud is growing increasingly sophisticated and frequent, according to Entrust. The findings reveal a deepfake attack happened every five minutes in 2024, while digital document forgeries increased 244%

React to this headline:

Loading spinner

Deepfake attacks occur every five minutes Read More »

US Space Tech Maker Maxar Discloses Employee Data Breach

US Space Tech Maker Maxar Discloses Employee Data Breach 2024-11-22 at 06:06 View original post at vpnMentor Maxar Technologies, a prominent US space technology firm, has disclosed a data breach that has compromised the personal information of its employees. The Colorado-based company, known for its satellite manufacturing and geospatial intelligence services, revealed that the breach

React to this headline:

Loading spinner

US Space Tech Maker Maxar Discloses Employee Data Breach Read More »

New infosec products of the week: November 22, 2024

New infosec products of the week: November 22, 2024 2024-11-22 at 06:03 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Aon, Arkose Labs, HiddenLayer, Hornetsecurity, Radware, and Tanium. Arkose Device ID detects suspicious activity patterns By adding Arkose Device ID to the Arkose Labs’

React to this headline:

Loading spinner

New infosec products of the week: November 22, 2024 Read More »

India’s Moon orbiter was shifted suddenly to avoid Korea’s and NASA’s craft

India’s Moon orbiter was shifted suddenly to avoid Korea’s and NASA’s craft 2024-11-22 at 04:33 By Laura Dobberstein Apparently there’s not enough space in space The Indian Space Research Organisation revealed late last week that its Chandrayaan-2 moon orbiter has twice maneuvered to avoid potential collisions with similar craft.… This article is an excerpt from

React to this headline:

Loading spinner

India’s Moon orbiter was shifted suddenly to avoid Korea’s and NASA’s craft Read More »

Here’s what happens if you don’t layer network security – or remove unused web shells

Here’s what happens if you don’t layer network security – or remove unused web shells 2024-11-22 at 03:18 By Jessica Lyons TL;DR: Attackers will break in and pwn you, as a US government red team demonstrated The US Cybersecurity and Infrastructure Agency often breaks into critical organizations’ networks – with their permission, of course –

React to this headline:

Loading spinner

Here’s what happens if you don’t layer network security – or remove unused web shells Read More »

Scroll to Top